Click here to view registration types and pricing (PDF)
2016 Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, March 29, 2016
    7:00 am
    Registration Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    8:00 am
    Executive Advisory Board Breakfast: "Certifications- What Are They Good For?" VIP/INVITE ONLY
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 9:15 am
    Location / Room: Room 205
    8:00 am
    SecureWorld Plus: Building a Successful Information Security Awareness Program
    • session level icon
    speaker photo
    Chief Strategist and CSO, Security Mentor, Named One of the World's Top 100 IT Security Influencers for 2019 by CISO Platform
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: Room 209
    8:00 am
    SecureWorld Plus: Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework
    • session level icon
    speaker photo
    CISO and Adjunct Faculty, University of Massachusetts
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: Room 204
    8:00 am
    SecureWorld Plus: Handling & Managing Security Incidents
    • session level icon
    speaker photo
    CISSP, President, O'Leary Management Education
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: Room 201
    8:30 am
    Computer Security For ML Business & Government
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Room 203
    8:30 am
    Information Security Solutions To Optimize Successful Implementations
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Room 207
    8:30 am
    LogicNow: Data Breach Risk Intelligence That Matters
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 pm
    Location / Room: Room 202
    8:30 am
    Privacy & Security Issues in Cloud Contracts
    • session level icon
    speaker photo
    Managing Partner, Scott & Scott, LLP
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Room 210
    8:30 am
    Security Governance for the Distributed Healthcare Enterprise
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    9:00 am
    Exhibit Floor Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 3:00 pm
    9:30 am
    OPENING KEYNOTE: Hunting The Electronic Criminals Boston Style
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote Theater
    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    10:15 am
    ISACA Chapter Meeting- Open to ISACA Members Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    10:15 am - 11:15 am
    Location / Room: Room 200
    11:00 am
    Executive Roundtables: Identity is the New Firewall--VIP/Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    11:15 am
    Garbo, D-Day and Ultimate Social Engineering
    • session level icon
    speaker photo
    CISSP, President, O'Leary Management Education
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    11:15 am
    Radware: Cyber War Chronicles - Stories From the Virtual Trenches
    • session level icon
    speaker photo
    Security Evangelist, Radware
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    11:15 am
    The Future of Security
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Room 203
    11:15 am
    Trend Micro: The State of the Online Underground
    • session level icon
    speaker photo
    Sr. Threat Researcher, Trend Micro
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: Room 207
    12:15 pm
    Using Cybersecurity Career Lifecycle (tm) to Get In and Stay In the Profession
    • session level icon
    Registration Level:
    • session level iconConference Pass
    12:15 pm - 1:00 pm
    12:00 pm
    Executive Roundtable: Risk Acceptance -- VIP/Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    12:15 pm
    LUNCH KEYNOTE: Radware - The Current Economics of Cyber Attacks
    • session level icon
    speaker photo
    Director of Security, Radware
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    1:15 pm
    Panel: After the Hack
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Room 208
    1:15 pm
    Panel: Current Threatscape
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm
    Location / Room: Room 210
    1:15 pm
    Tavve: Prepping for the OSCP - Kali/ARM/NIST/FIPS/AES/Python
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm
    Location / Room: Room 203
    2:15 pm
    (ISC)^2 Chapter Meeting - Open to All Attendees
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    2:15 pm
    Conference Dessert Break / Exhibitor Product Demonstrations
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    Location / Room: SecureWorld Exhibit Floor
    3:00 pm
    Big Red Dots - Risk Communication Strategy
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Room 208
    3:00 pm
    Open Source Intelligence (OSINT) - Is There Any Privacy Left?
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    3:00 pm
    Panel: Locking Down the Endpoints
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Haverford
    3:00 pm
    SecureWorld Plus: Building a Successful Information Security Awareness Program (SecureWorld Plus Registrants ONLY)
    • session level icon
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 pm
    3:00 pm
    SecureWorld Plus: Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (SecureWorld Plus Registrants ONLY)
    • session level icon
    speaker photo
    CISO and Adjunct Faculty, University of Massachusetts
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 pm
    Location / Room: Room 204
    3:00 pm
    SecureWorld Plus: Handling & Managing Security Incidents - (SecureWorld Plus Registrants Only)
    • session level icon
    speaker photo
    CISSP, President, O'Leary Management Education
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 pm
    3:15 pm
    Optiv Happy Hour
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:15 pm - 6:00 pm
    Location / Room: Town Stove & Spirits
  • Thursday, March 30, 2016
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    7:30 am
    ISSA Chapter Meeting / Breakfast- Member Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    7:30 am - 9:00 am
    8:00 am
    SecureWorld Plus: Building a Successful Information Security Awareness Program (SecureWorld Plus Registrants ONLY)
    • session level icon
    speaker photo
    Chief Strategist and CSO, Security Mentor, Named One of the World's Top 100 IT Security Influencers for 2019 by CISO Platform
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: Room 209
    8:00 am
    SecureWorld Plus: Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (SecureWorld Plus Registrants ONLY)
    • session level icon
    speaker photo
    CISO and Adjunct Faculty, University of Massachusetts
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: Room 204
    8:00 am
    SecureWorld Plus: Handling & Managing Security Incidents - (SecureWorld Plus Registrants ONLY)
    • session level icon
    speaker photo
    CISSP, President, O'Leary Management Education
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: Room 204
    8:30 am
    Compliance Step 1- Let's Begin With Data Inventory
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    8:30 am
    InfraGard Chapter Meeting: Open to all Attendees
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: Keynote Theater
    8:30 am
    PCI Compliance- NOT FOR DUMMIES
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Room 207
    8:30 am
    Protecting the Crown Jewels: How to Incorporate Security and Privacy Into Procurement and Contracting
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    9:00 am
    Exhibit Floor Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 3:00 pm
    Location / Room: SecureWorld Exhibit Floor
    9:30 am
    OPENING KEYNOTE: Enhancing Enterprise Resilience through Software Assurance and Supply Chain Risk Management
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote Theater
    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    11:00 am
    Executive Advisory Council Roundtable: After the Hack -- VIP / Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    11:15 am
    Bitdefender: Know What You Don't Know: Address Hidden Threats to Your Datacenter
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: Room 202
    11:15 am
    Check Point: High Value Employees in the Crosshairs: New Developments in Cybersecurity for Mobile Devices
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    11:15 am
    Cyber Insurance: Is it Worth it and is it Required?
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    11:15 am
    Cybereason: Defense Grade Cybersecurity
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    11:00 am
    SecureAuth: Identity in Security- Know Who's in Your Network
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    12:00 pm
    Advisory Council Roundtable Lunch: Let’s Talk About Risk - Lunch Served VIP/Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    12:15 pm
    LUNCH KEYNOTE: Optiv- Beyond the Security Team: The Economics of Breach Response
    • session level icon
    speaker photo
    CISO, Pharmaceuticals and R&D, GSK (GlaxoSmithKline)
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    1:15 pm
    GuidePoint Security: GRC- Trials & Tribulations
    • session level icon
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    1:15 pm
    Panel: Emerging Threats
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    1:15 pm
    Panel: You've Got Humans on Your Network
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    1:15 pm
    Tanium:ASK – KNOW – ACT: Navigating the Breach Landscape
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm
    2:15 pm
    Conference Dessert Break / Exhibitor Product Demonstrations
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    2:15 pm
    Dash for Prizes & CyberHunt
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 2:45 pm
    3:00 pm
    How Adopting the Public Cloud Can Improve Your Enterprise Security
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    3:00 pm
    Infosec Rock Star: Geek Will Only Get You so Far
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    3:00 pm
    Weakening Cyber-Adversaries & Strengthening Cyber-Allies
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
Exhibitors
  • Boston, MA 2016
    Booth: 202
  • Boston, MA 2016
    Booth: 205
  • Boston, MA 2016
    Booth: 605
  • Boston, MA 2016
    Booth: 442
  • Boston, MA 2016
    Booth:
  • Boston, MA 2016
    Booth: 606
  • Boston, MA 2016
    Booth: 420
  • Boston, MA 2016
    Booth: 409
  • Boston, MA 2016
    Booth: 320
  • Boston, MA 2016
    Booth: 209
  • Boston, MA 2016
    Booth: 406
  • Boston, MA 2016
    Booth: 304
  • Boston, MA 2016
    Booth: 108
  • Boston, MA 2016
    Booth: 309
  • Boston, MA 2016
    Booth: 305
  • Boston, MA 2016
    Booth: 104
  • Boston, MA 2016
    Booth: 320
  • Boston, MA 2016
    Booth: 404
  • Boston, MA 2016
    Booth: 124
  • Boston, MA 2016
    Booth: 618
  • Boston, MA 2016
    Booth: 301
  • Boston, MA 2016
    Booth: 303
  • Boston, MA 2016
    Booth: 303
  • Boston, MA 2016
    Booth: 314
  • Boston, MA 2016
    Booth: 509
  • Boston, MA 2016
    Booth: 511
  • Boston, MA 2016
    Booth: 306
  • Boston, MA 2016
    Booth: 514
  • Boston, MA 2016
    Booth: 320
  • Boston, MA 2016
    Booth: 303
  • Boston, MA 2016
    Booth: 613
  • Boston, MA 2016
    Booth: 416
  • Boston, MA 2016
    Booth: 505
  • Boston, MA 2016
    Booth: 515
  • Boston, MA 2016
    Booth: 118
  • Boston, MA 2016
    Booth:
  • Boston, MA 2016
    Booth: 203
  • Boston, MA 2016
    Booth: 516
  • Boston, MA 2016
    Booth: 501
  • Boston, MA 2016
    Booth: 502
  • Boston, MA 2016
    Booth: 312
  • Boston, MA 2016
    Booth: 208
  • Boston, MA 2016
    Booth: 708
  • Boston, MA 2016
    Booth: 204
  • Boston, MA 2016
    Booth: 215
  • Boston, MA 2016
    Booth: 614
  • Boston, MA 2016
    Booth: 300
  • Boston, MA 2016
    Booth: 602
  • Boston, MA 2016
    Booth: 512
  • Boston, MA 2016
    Booth: 317
  • Boston, MA 2016
    Booth:
  • Boston, MA 2016
    Booth: 320
  • Boston, MA 2016
    Booth: 201
  • Boston, MA 2016
    Booth: 711
  • Boston, MA 2016
    Booth: 500
  • Boston, MA 2016
    Booth: 506
  • Boston, MA 2016
    Booth: 704
  • Boston, MA 2016
    Booth: 315
  • Boston, MA 2016
    Booth: 617
  • Boston, MA 2016
    Booth: 604
  • Boston, MA 2016
    Booth: 401
  • Boston, MA 2016
    Booth: 402
  • Boston, MA 2016
    Booth: 415
  • Boston, MA 2016
    Booth: 513
  • Boston, MA 2016
    Booth: 316
  • Boston, MA 2016
    Booth: 217
  • Boston, MA 2016
    Booth: 413
  • Boston, MA 2016
    Booth: 503
  • Boston, MA 2016
    Booth: 200
  • Boston, MA 2016
    Booth: 314
  • Boston, MA 2016
    Booth: 600
  • Boston, MA 2016
    Booth: 504
  • Boston, MA 2016
    Booth:
  • Boston, MA 2016
    Booth: 400
  • Boston, MA 2016
    Booth:
  • Boston, MA 2016
    Booth: 408
  • Boston, MA 2016
    Booth: 420
  • Boston, MA 2016
    Booth: 320
  • Boston, MA 2016
    Booth: 508
  • Boston, MA 2016
    Booth: 308
  • Boston, MA 2016
    Booth: 414
  • Boston, MA 2016
    Booth: 312, 108
Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Dan Lohrmann
    Chief Strategist and CSO, Security Mentor, Named One of the World's Top 100 IT Security Influencers for 2019 by CISO Platform

    Dan Lohrmann is Chief Strategist and Chief Security Officer (CSO) at Security Mentor. In this role, Lohrmann leads efforts to define and develop key strategic initiatives for the company’s security awareness training offerings, including new programs that can improve security and compliance by elevating an organization’s workforce into security savvy employees. Representing Security Mentor, Lohrmann serves as thought leader serving as a keynote speaker on security and security awareness training, and giving government and industry presentations.

    Over the past decade, Lohrmann has advised the U.S. Department of Homeland Security, the White House, FBI, numerous federal agencies, law enforcement, state and local governments, non-profits, foreign governments, local businesses, universities, churches, and home users on issues ranging from personal Internet safety to defending government and business-owned technology and critical infrastructures from online attacks. Prior to joining Security Mentor, Lohrmann was Michigan's first CSO and Deputy Director for Cybersecurity and Infrastructure Protection and has been recognized as a global leader in cyber defense for government.

    Previously, Lohrmann represented the National Association of State Chief Information Officers on the U.S. Department of Homeland Security’s IT Government Coordinating Council where he assisted in the writing and editing of the National Infrastructure Protection Plans, sector specific plans, Cybersecurity Framework, and other federal cyber documents. Lohrmann is the author of two books: Virtual Integrity: Faithfully Navigating the Brave New Web, published in November 2008 by Brazos Press and BYOD for You: The Guide to Bring Your Own Device to Work, published in Kindle format in April 2013.

    He has been honored with numerous cybersecurity and technology leadership awards, including “CSO of the Year” by SC Magazine, “Public Official of the Year” by Governing magazine and “Premier 100 IT Leader” by Computerworld Magazine. Lohrmann received his bachelor’s degree in computer science from Valparaiso University in Indiana and his M.S. in Computer Science from Johns Hopkins University in Baltimore.

  • speaker photo
    Larry Wilson
    CISO and Adjunct Faculty, University of Massachusetts

    Larry Wilson is currently a senior consultant and former Chief Information Security Officer for the University of Massachusetts President's Office. In the CISO role, Larry was responsible for developing, implementing and overseeing compliance with the UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the UMass cybersecurity program, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, The NIST Cybersecurity Framework Foundations, The NIST Cybersecurity Framework Practitioners, Engineering, Technology and Business Labs and Workshops based on the NIST Cybersecurity Framework, etc. Larry has also worked with multiple companies in multiple industries to help design, build and maintain their Cybersecurity Programs and evaluate their current security posture.

  • speaker photo
    John O'Leary
    CISSP, President, O'Leary Management Education

    John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award

  • speaker photo
    Robert Scott
    Managing Partner, Scott & Scott, LLP

    Robert represents mid-market and large enterprise companies in software license transactions and disputes with major software publishers such as Adobe, IBM, Microsoft & Oracle. He is counsel to some of the largest corporations on information technology matters including intellectual property licensing, risk management, data privacy, and outsourcing.

  • speaker photo
    John O'Leary
    CISSP, President, O'Leary Management Education

    John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award

  • speaker photo
    Ron Winward
    Security Evangelist, Radware

    Ron Winward is a Security Evangelist for Radware, where he helps execute the company’s thought leadership on today’s security threat landscape. Ron brings nearly 20 years of experience in the Internet service provider space, most recently as Director of Network Engineering for a global infrastructure and colocation provider. With an expertise in network architectures and DDoS mitigation, Ron has helped design solutions for carriers, enterprises, and cybersecurity service providers around the world.

  • speaker photo
    Kyle Wilhoit
    Sr. Threat Researcher, Trend Micro

    Kyle Wilhoit has been actively involved in the security industry for over 10 years. Kyle has a Bachelors degree from Lindenwood University and Masters degrees from Penn State University and Lindenwood University. In the private industry, Kyle has worked as a Sr. Threat Researcher at Trend Micro, a Sr. Threat Hunter at Fireeye, a Penetration Tester at a large Coal Mining company, and an Incident Responder at a Tier 1 ISP. Kyle has spoken on four continents at professional conferences such as, Blackhat US, Blackhat EU, FIRST, and Hack in the Box. He has been featured as an industry expert on several news outlets, including: ABC, CNN, CBS News, NBC News, BBC, The Guardian, and many additional outlets.

    Kyle has extensive experience in Threat Intelligence, Penetration Testing, SCADA/ICS Security, and Incident Response. Kyle is an author on the upcoming Hacking Exposed ICS/SCADA book, where he served as the expert for ICS Malware and threat actors against ICS environments. If Kyle isn't traveling around the globe you can find him in his hometown of St. Louis.

  • speaker photo
    Ben Desjardins
    Director of Security, Radware

    Ben Desjardins drives the development of vertical and use-case specific solutions for Radware’s Security Product Portfolio. In this role, Ben focuses extensively on the competitive landscape for anti-DDoS, Web Application Firewalls and Intrusion Prevention Systems.

    Ben has extensive experience across a wide array of security technologies and disciplines, including DDoS, DNS, SSL, Threat/Vulnerability Management, IAM and PCI-DSS and he brings nearly two decades of marketing management experience to his work at Radware, including over 12 years focused on the information security and cyber threat arenas. Additionally, Ben has led global go-to-market efforts across many industries including retail, Ecommerce, financial services, public sector and healthcare/life sciences.

  • speaker photo
    Larry Wilson
    CISO and Adjunct Faculty, University of Massachusetts

    Larry Wilson is currently a senior consultant and former Chief Information Security Officer for the University of Massachusetts President's Office. In the CISO role, Larry was responsible for developing, implementing and overseeing compliance with the UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the UMass cybersecurity program, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, The NIST Cybersecurity Framework Foundations, The NIST Cybersecurity Framework Practitioners, Engineering, Technology and Business Labs and Workshops based on the NIST Cybersecurity Framework, etc. Larry has also worked with multiple companies in multiple industries to help design, build and maintain their Cybersecurity Programs and evaluate their current security posture.

  • speaker photo
    John O'Leary
    CISSP, President, O'Leary Management Education

    John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award

  • speaker photo
    Dan Lohrmann
    Chief Strategist and CSO, Security Mentor, Named One of the World's Top 100 IT Security Influencers for 2019 by CISO Platform

    Dan Lohrmann is Chief Strategist and Chief Security Officer (CSO) at Security Mentor. In this role, Lohrmann leads efforts to define and develop key strategic initiatives for the company’s security awareness training offerings, including new programs that can improve security and compliance by elevating an organization’s workforce into security savvy employees. Representing Security Mentor, Lohrmann serves as thought leader serving as a keynote speaker on security and security awareness training, and giving government and industry presentations.

    Over the past decade, Lohrmann has advised the U.S. Department of Homeland Security, the White House, FBI, numerous federal agencies, law enforcement, state and local governments, non-profits, foreign governments, local businesses, universities, churches, and home users on issues ranging from personal Internet safety to defending government and business-owned technology and critical infrastructures from online attacks. Prior to joining Security Mentor, Lohrmann was Michigan's first CSO and Deputy Director for Cybersecurity and Infrastructure Protection and has been recognized as a global leader in cyber defense for government.

    Previously, Lohrmann represented the National Association of State Chief Information Officers on the U.S. Department of Homeland Security’s IT Government Coordinating Council where he assisted in the writing and editing of the National Infrastructure Protection Plans, sector specific plans, Cybersecurity Framework, and other federal cyber documents. Lohrmann is the author of two books: Virtual Integrity: Faithfully Navigating the Brave New Web, published in November 2008 by Brazos Press and BYOD for You: The Guide to Bring Your Own Device to Work, published in Kindle format in April 2013.

    He has been honored with numerous cybersecurity and technology leadership awards, including “CSO of the Year” by SC Magazine, “Public Official of the Year” by Governing magazine and “Premier 100 IT Leader” by Computerworld Magazine. Lohrmann received his bachelor’s degree in computer science from Valparaiso University in Indiana and his M.S. in Computer Science from Johns Hopkins University in Baltimore.

  • speaker photo
    Larry Wilson
    CISO and Adjunct Faculty, University of Massachusetts

    Larry Wilson is currently a senior consultant and former Chief Information Security Officer for the University of Massachusetts President's Office. In the CISO role, Larry was responsible for developing, implementing and overseeing compliance with the UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the UMass cybersecurity program, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, The NIST Cybersecurity Framework Foundations, The NIST Cybersecurity Framework Practitioners, Engineering, Technology and Business Labs and Workshops based on the NIST Cybersecurity Framework, etc. Larry has also worked with multiple companies in multiple industries to help design, build and maintain their Cybersecurity Programs and evaluate their current security posture.

  • speaker photo
    John O'Leary
    CISSP, President, O'Leary Management Education

    John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award

  • speaker photo
    Dawn-Marie Hutchinson
    CISO, Pharmaceuticals and R&D, GSK (GlaxoSmithKline)

    Dawn-Marie Hutchinson brings more than 15 years of enterprise information technology experience to her role as CISO of GSK. She is an innovative business partner with extensive experience serving on Enterprise Risk Management teams. Hutchinson is an expert in providing data privacy and security solutions to manage information risk, improve IT governance and strengthen internal controls. Hutchinson’s extensive experience in information security and privacy program development has served the healthcare, insurance, retail and higher education sectors.

    While serving on the HITRUST working group for Data De-Identification, Hutchinson established standards and controls for the anonymization of patient level data and is credited with authoring the white paper for defining those levels, as well as use cases for the secondary uses of medical data. Additionally, she served on the HITRUST Privacy working group tasked with revising the HITRUST Common Security Framework to include additional privacy controls and the inclusion of NIST application recommendations.

    Prior to joining GSK, Hutchinson was the CSO at Comm Solutions and also led the information security program at Urban Outfitters, based in Philadelphia. Her tenure in IT also includes work at Walt Disney World, Co., Banknorth Group, Inc., Independence Blue Cross, Protiviti, and Optiv.

    Hutchinson currently sits on the Cyber Security Canon Committee, was the recipient of the CRM Women’s Power 50 award and hold accreditations that include Certified Information Security Manager (CISM), Certified in Risk and Information System Controls (CRISC), Certified Information Systems Auditor (CISA) and former Payment Card Industry Qualified Security Assessor (QSA). She is also a 2013 Master’s of Business Administration graduate of the Saint Joseph’s University Haub School of Business.

secure world app
Conference App and Microsite!
Registration is easy and takes just a few minutes. Once you get started you can use your phone, tablet or internet browser to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
app store play store